{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-9632: fix buffer overflow in _XkbSetCompatMap()\n- CVE-2025-62229: fix use-after-free condition due improper error handling\n  during notification creation leading to DoS\n- CVE-2025-62230: fix use-after-free condition due freeing certain data\n  structures without properly detaching related resources\n- CVE-2025-62231: fix unsigned short overflow in XkbSetCompatMap() function",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux7els/advisories/2025/clsa-2025_1765209058.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-08T15:51:59Z",
      "generator": {
        "date": "2025-12-08T15:51:59Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1765209058",
      "initial_release_date": "2025-12-08T15:51:59Z",
      "revision_history": [
        {
          "date": "2025-12-08T15:51:59Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "xorg-x11-server: Fix of 4 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "Oracle-Linux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xdmx@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xwayland@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xnest@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-devel@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xephyr@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-common@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xvfb@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-Xorg@1.20.4-99.el7_9.tuxcare.els8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-devel@1.20.4-99.el7_9.tuxcare.els8?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/xorg-x11-server-source@1.20.4-99.el7_9.tuxcare.els8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-9632",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-9632"
        }
      ],
      "release_date": "2024-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-08T15:51:00.326784Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058",
          "product_ids": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-62230",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62230"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-08T15:51:00.326784Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058",
          "product_ids": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-62231",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62231"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-08T15:51:00.326784Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058",
          "product_ids": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-62229",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
          "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
          "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-62229"
        }
      ],
      "release_date": "2025-10-29T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-08T15:51:00.326784Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058",
          "product_ids": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1765209058"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:xorg-x11-server-Xdmx-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xephyr-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xnest-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xorg-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xvfb-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-Xwayland-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-common-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.i686",
            "Oracle-Linux-7:xorg-x11-server-devel-0:1.20.4-99.el7_9.tuxcare.els8.x86_64",
            "Oracle-Linux-7:xorg-x11-server-source-0:1.20.4-99.el7_9.tuxcare.els8.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}